2016
DOI: 10.1109/tvt.2015.2501461
|View full text |Cite
|
Sign up to set email alerts
|

Dual Antenna Selection in Secure Cognitive Radio Networks

Abstract: This paper investigates data transmission and physical layer secrecy in cognitive radio network. We propose to apply full duplex transmission and dual antenna selection at secondary destination node. With the full duplex transmission, the secondary destination node can simultaneously apply the receiving and jamming antenna selection to improve the secondary data transmission and primary secrecy performance respectively. This describes an attractive scheme in practice: unlike that in most existing approaches, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 64 publications
(28 citation statements)
references
References 31 publications
0
28
0
Order By: Relevance
“…2, the non-colluding scenario shows that a higher meta distribution has been achieved. It once again [17] shows that colluding among the EDs will decrease the probability of achieving a target secrecy rate of the legitimate link. In addition, F of the non-colluding scenario is lower bounded by the colluding scenario with the same parameters since the legitimate link of the non-colluding scenario will achieve a similar or even higher probability than its colluding counterpart for the same realization.…”
Section: Simulations and Discussionmentioning
confidence: 94%
“…2, the non-colluding scenario shows that a higher meta distribution has been achieved. It once again [17] shows that colluding among the EDs will decrease the probability of achieving a target secrecy rate of the legitimate link. In addition, F of the non-colluding scenario is lower bounded by the colluding scenario with the same parameters since the legitimate link of the non-colluding scenario will achieve a similar or even higher probability than its colluding counterpart for the same realization.…”
Section: Simulations and Discussionmentioning
confidence: 94%
“…Recently, a few publications have applied FD principles in underlay DSS networks from the perspective of physical-layer security [139,140]. By incorporating FD functionality at the secondary destination node, it can simultaneously perform the selection of the receive and jamming antennas in order to improve the secondary throughput and the secrecy performance of the primary system, respectively.…”
Section: A Underlay Dss Networkmentioning
confidence: 99%
“…By incorporating FD functionality at the secondary destination node, it can simultaneously perform the selection of the receive and jamming antennas in order to improve the secondary throughput and the secrecy performance of the primary system, respectively. Following this concept, authors in [139] proposed an FD dual antenna selection scheme for an underlay CR network and derived the outage probability for the secondary system as well as upper and lower bounds of secrecy outage probability for the primary system. In addition, authors in [140] studied a physical layer security problem for an underlay CR system considering FD operation at the wirelessly-powered destination node, which is equipped with one transmit antenna and one receive antenna capable of simultaneously receiving energy and information from the source.…”
Section: A Underlay Dss Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Without knowledge of ED locations, a natural objective is to minimize the average SNR of EDs γ E subject to a constraint on the minimum required UE SNR γ U , same as in RF communications [23]- [25]. A related, alternative objective may be to maximize γ U subject to a constraint on γ E .…”
Section: A Beamforming Based On Snrmentioning
confidence: 99%